A user-centric privacy-preserving authentication protocol for IoT-AmI environments

被引:18
|
作者
Masud, Mehedi [1 ]
Gaba, Gurjot Singh [2 ]
Kumar, Pardeep [3 ]
Gurtov, Andrei [2 ]
机构
[1] Taif Univ, Coll Comp & Informat Technol, Dept Comp Sci, POB 11099, Taif 21944, Saudi Arabia
[2] Linkoping Univ LiU, Dept Comp & Informat Sci IDA, S-58183 Linkoping, Sweden
[3] Swansea Univ, Dept Comp Sci, Swansea SA1 8EN, Wales
关键词
Ambient intelligence; Blockchain; Fog computing; Healthcare; Internet of Things (IoT); WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; INDUSTRIAL INTERNET; BLOCKCHAIN; SECURE; HASH; FRAMEWORK; CONSENSUS; ROBUST;
D O I
10.1016/j.comcom.2022.09.021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ambient Intelligence (AmI) in Internet of Things (IoT) has empowered healthcare professionals to monitor, diagnose, and treat patients remotely. Besides, the AmI-IoT has improved patient engagement and gratification as doctors' interactions have become more comfortable and efficient. However, the benefits of the AmI-IoT-based healthcare applications are not availed entirely due to the adversarial threats. IoT networks are prone to cyber attacks due to vulnerable wireless mediums and the absentia of lightweight and robust security protocols. This paper introduces computationally-inexpensive privacy-assuring authentication protocol for AmI-IoT healthcare applications. The use of blockchain & fog computing in the protocol guarantees unforgeability, non-repudiation, transparency, low latency, and efficient bandwidth utilization. The protocol uses physically unclonable functions (PUF), biometrics, and Ethereum powered smart contracts to prevent replay, impersonation, and cloning attacks. Results prove the resource efficiency of the protocol as the smart contract incurs very minimal gas and transaction fees. The Scyther results validate the robustness of the proposed protocol against cyber-attacks. The protocol applies lightweight cryptography primitives (Hash, PUF) instead of conventional public-key cryptography and scalar multiplications. Consequently, the proposed protocol is better than centralized infrastructure-based authentication approaches.
引用
收藏
页码:45 / 54
页数:10
相关论文
共 50 条
  • [1] PassBio: Privacy-Preserving User-Centric Biometric Authentication
    Zhou, Kai
    Ren, Jian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (12) : 3050 - 3063
  • [2] Comments on "PassBio: Privacy-Preserving User-Centric Biometric Authentication"
    Kwon, Hee-Yong
    Lee, Mun-Kyu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 2816 - 2817
  • [3] Privacy-Preserving User-Centric Authentication Protocol for IoT-Enabled Vehicular Charging System Using Decentralized Identity
    Parameswarath R.P.
    Gope P.
    Sikdar B.
    IEEE Internet of Things Magazine, 2023, 6 (01): : 70 - 75
  • [4] An Enhanced Authentication Protocol for IoT-AmI Environment
    Khichar, Shree Chand
    Yadav, Awaneesh Kumar
    Misra, Manoj
    Gupta, Brij B.
    20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024, 2024, : 691 - 696
  • [5] A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking
    Herrmann, Dominik
    Scheuer, Florian
    Feustel, Philipp
    Nowey, Thomas
    Federrath, Hannes
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2009, 5695 : 32 - 41
  • [6] User-Centric Distributed Solutions for Privacy-Preserving Analytics
    Bestavros, Azer
    Lapets, Andrei
    Varia, Mayank
    COMMUNICATIONS OF THE ACM, 2017, 60 (02) : 37 - 39
  • [7] A mapping of IoT user-centric privacy preserving approaches to the GDPR
    Kounoudes, Alexia Dini
    Kapitsaki, Georgia M.
    INTERNET OF THINGS, 2020, 11
  • [8] A Privacy-Preserving User-Centric Data-Sharing Scheme
    Boiarkin, Veniamin
    Bogaz Zarpelao, Bruno
    Al-Zaili, Jafar
    Rajarajan, Muttukrishnan
    IEEE ACCESS, 2024, 12 : 149977 - 149987
  • [9] User-Centric Privacy-Preserving Collection and Analysis of Trajectory Data
    Romero-Tris, Cristina
    Megias, David
    DATA PRIVACY MANAGEMENT, AND SECURITY ASSURANCE, 2016, 9481 : 245 - 253
  • [10] A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments
    R. Shashidhara
    Sriramulu Bojjagani
    Anup Kumar Maurya
    Saru Kumari
    Hu Xiong
    Peer-to-Peer Networking and Applications, 2020, 13 : 1943 - 1966